Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Computinghasbeenanenormousacceleratortoscienceandindustryalikeandit has led to an information explosion in many di?erent ?elds. The unprecedented volume of data acquired from sensors, derived by simulations and data analysis processes, accumulated in warehouses, and often shared on the Web, has given risetoanew?eldofresearch: provenancemanagement.Provenance(alsoreferred to as audit trail, lineage, and pedigree) captures information about the steps used to generate a given data product. Such information provides important documentation that is key to preserving data, to determining the data's quality and authorship, to understanding, reproducing, as well as validating results. Provenancemanagement has become an active ?eld of research, as evidenced byrecentspecializedworkshops, surveys, andtutorials.Provenancesolutionsare needed in many di?erent domains and applications, from environmental science and physics simulations, to business processes and data integration in wa- houses. Not surprisingly, di?erent techniques and provenance models have been proposed in many areas such as work?ow systems, visualization, databases, d- ital libraries, and knowledge representation. An important challenge we face - dayishowtointegratethesetechniquesandmodelssothatcompleteprovenance can be derived for complex data products. The InternationalProvenanceand AnnotationWorkshop(IPAW 2008)wasa follow-up to previous workshopsin Chigago (2006, 2002)and Edinburgh (2003). It was held during June 17-18, in Salt Lake City, at the University of Utah campus. IPAW 2008 brought together computer scientists from di?erent areas and provenance users to discuss open problems related to the provenance of computational and non-computational artifacts. A total of 55 people attended the workshop.
Exploring the implications of the internet and bio-technologies for intimate and sexual life, this book discusses the concept of citizenship in relation to the extension of public health through the internet, and reveals concerns that sexually transmitted infections and HIV are associated with such technologies.
This volume contains the papers presented at the International Workshop on Internet and Network Economics held during December 17-20, 2008, in Sha- hai, China, for its fourth edition. WINE 2008 provided a forum for researchers from di?erent disciplines to communicate with each other and exchange their researching ?ndings in this emerging ?eld. WINE 2008hadteninvitedspeakers: FanChungGraham, MatthewJackson, Lawrence Lau, Tom Luo, Eric Maskin, Paul Milgrom, Christos Papadimitriou, Herbert Scarf, Hal Varian and Yinyu Ye. There were 126 submissions. Each submission was reviewed on average by 2. 5 Programme Committee members. The Committee decided to accept 68 papers. The programme also included 10 invited talks. This ?nal program contained papers covering topics including equilibrium, information markets, sponsored auction, network economics, mechanism - sign, socialnetworks, advertisementpricing, computationalequilibrium, network games, algorithms and complexity for games. December 2008 Christos Papadimitriou Shuzhong Zhang Organization Programme Chairs Conference Chair Herbert E. Scarf (Yale University) Program Co-chair Christos Papadimitriou (UC Berkeley) Program Co-chair Shuzhong Zhang (Chinese University of Hong Kong) Local Organizing Committee Chairs Committee Chair Yifan Xu (Fudan University) Committee Co-chair Duan Li (Chinese University of Hong Kong) Committee Co-chair ShouyangWang(ChineseAcademyofSciences) Committee Co-chair Xiaoping Zhao (SSE INFONE
The emerging information technologies have enabled new human patterns ranging from physiological interactions to psychological interactions. Perhaps the best example is the rapid 'evolution' of our thumbs from simply holding to controlling mobile devices in just a few years recently. Taking the medical field as an example, the fast-growing technologies such as pill cameras, implantable devices, robotic surgeries, and virtual reality training methods will change the way we live and work. Human Algorithms aim to model human forms, interactions, and dynamics in this new context. Human Algorithms are engineering methods that are beyond theories. They intend to push the envelopes of multi-physics, sensing, and virtual technologies to the limit. They have become more comprehensive and inexpensive for use in real-world designs: inside monitors, connected to networks, and under the patient's skin. This book aims to reflect the state of the art of Human Algorithms. It is a survey of innovative ideas for readers who may be new to this field. The targeted groups include college students, researchers, engineers, designers, scientists, managers, and healthcare professionals. The 11 chapters are divided into three parts: Human Dynamics, Virtual Humans, and Human Forms. Part I: Human Dynamics. In the first chapter "Implantable Computing," Warwick and Gasson present an overview of the latest developments in the field of Brain to Computer Interfacing. They describe human experimentation in which neural implants have linked the human nervous system bi-directionally with technological devices and the Internet. In the chapter "Brainwave-Based Imagery Analysis," Cowell et al.
This volume constitutes the proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, held in Esbjerg Denmark, December 3-5, 2008. Intelligence and security informatics (ISI) is a multidisciplinary ?eld enc- passing methodologies, models, algorithms, and advanced tools for intelligence analysis, homeland security, terrorism research as well as security-related public policies. EuroISI 2008 was the ?rst European edition of the series of ISI sym- siums that have been held annually in the USA since 2003, and more recently in Asia. These meetings gather together people from previously disparate c- munities to provide a stimulating forum for the exchange of ideas and results. Participantshave included academic researchers(especially in the ?elds of inf- mation technologies, computer science, public policy, and social and behavioral studies), law enforcement and intelligence experts, as well as information te- nology companies, industry consultants and practitioners in the relevant ?elds. These proceedings contain 25 originalpapers, out of 48 submissions received, related to the topics of intelligence and security informatics. The papers cover a broad range of ?elds such as: social network analysis, knowledge discovery, web-based intelligence and analysis, privacy protection, access control, digital rights management, malware and intrusion detection, surveillance, crisis m- agement, andcomputationalintelligence, amongothers.Additionallytothemain conference, a poster section was organize
This volume contains the proceedings of the Second European Ambient Intelligence (AmI) Conference. The conference took place in Erlangen and Nurnberg, November 19-22, 2008. The concept of ambient intelligence (AmI) was introduced in the late 1990s as a novel paradigm for electronic environments for the years 2010-2020. It builds on the early visions of Weiser describing a novel mobile computing infrastr- ture integrated into the networked environment of people. According to early defi- tions, AmI refers to smart electronic surroundings that are sensitive and responsive to the presence of people. The added value for the multi-dimensional society we are living in lies in the fact that the large-scale integration of microelectronics into the environment enables people and objects to interact with this environment in a se- less, trustworthy, and natural manner. Obviously, AmI solutions deliver a new quality of communication and information exchange, they help people to fulfill their professional tasks with increasing efficiency, enable the older generation to stay much longer in the privacy of their own homes and the younger one to lead a healthy and responsible life. Smart mobile devices navigate in private apartments as well as in complex public or industrial environments in order to support people with a broad variety of services."
The 2008 Biosurveillance and Biosecurity Workshop (BioSecure 2008) was built on the success of the two U. S. National Science Foundation-sponsored Biosurveillance Workshops. The inaugural 2006 workshop was hosted by the University of Arizona's NSF BioPortal Center. It attracted more than 35 participants from academic insti- tions, industry, and public health agencies, and achieved its objective of bringing together infectious disease informatics (IDI) researchers and practitioners to discuss selected topics directly relevant to data sharing and analysis for real-time animal and public health surveillance. The 2007 meeting was held in New Brunswick, New J- sey, co-located with the 2007 IEEE International Conference on Intelligence and - curity Informatics, and met with tremendous success. Researchers from a wide range of backgrounds, including biosecurity, epidemiology, statistics, applied mathematics, information systems, computer science and machine learning/data mining, contributed formal papers to the workshop and actively participated in the meeting along with practitioners from both government agencies and industry. More than 65 people - tended the one-day workshop, representing major research labs across multiple dis- plines, key industry players, and a range of government entities. BioSecure 2008 continued this workshop series aiming to achieve the following objectives: (a) review and examine various informatics approaches for health surve- lance and biosecurity from both technological and policy perspectives; and (b) discuss and compare various systems approaches and algorithms of relevance to biosurve- lance and biosecurity.
This book constitutes the thoroughly refereed joint post-workshop proceedings of three international workshops held in conjunction with the 10th Asia-Pacific Web Conference, APWeb 2008, in Shenyang, China, in April 2008 (see LNCS 4976). The 15 revised full papers presented together with 4 invited papers and 4 keynote lectures were carefully reviewed and selected from numerous submissions. Topics addressed by the workshops are business intelligence and data mining (BIDM 2008), health data management (IWHDM 2008), and data engineering and Web technology research (DeWeb 2008). The papers focus on issues such as Web searching, Web services, database, data mining, bioinformatics, and business intelligence.
This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was held during October 3-5, 2007 in Benalmadena-Costa (Malaga), Spain, and was hosted by the University of Malaga, Computer Science Department. In response to the 2007 call for papers, 75 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and critical infrastructures relevance of the work reported therein. At the end of the reviewing process, only 29 papers were selected for pres- tation. Revisions were not checked and the authors bear full responsibility for the content of their papers. CRITIS 2007 was very fortunate to have four exceptional invited speakers: Adrian Gheorghe (Old Dominion University, USA), Paulo Verissimo (Universidade de L- boa, Portugal), Donald Dudenhoeffer (Idaho National Labs, USA), and Jacques Bus (European Commission, INFSO Unit "Security"). The four provided a high added value to the quality of the conference with very significant talks on different and int- esting aspects of Critical Information Infrastructures. In 2007, CRITIS demonstrated its outstanding quality in this research area by - cluding ITCIP, which definitively reinforced the workshop. Additionally, the solid involvement of the IEEE community on CIP was a key factor for the success of the event. Moreover, CRITIS received sponsorship from Telecom Italia, JRC of the European Commission, IRRIIS, IFIP, and IABG, to whom we are greatly indebted."
th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19-21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding's po- tion as the top forum of our community.
Information technology has now pervaded the legal sector, and the very modern concepts of e-law and e-justice show that automation processes are ubiquitous. European policies on transparency and information society, in particular, require the use of technology and its steady improvement. Some of the revised papers presented in this book originate from a workshop held at the European University Institute of Florence, Italy, in December 2006. The workshop was devoted to the discussion of the different ways of understanding and explaining contemporary law, for the purpose of building computable models of it -- especially models enabling the development of computer applications for the legal domain. During the course of the following year, several new contributions, provided by a number of ongoing (or recently finished) European projects on computation and law, were received, discussed and reviewed to complete the survey. This book presents 20 thoroughly refereed revised papers on the hot topics under research in different EU projects: legislative XML, legal ontologies, semantic web, search and meta-search engines, web services, system architecture, dialectic systems, dialogue games, multi-agent systems (MAS), legal argumentation, legal reasoning, e-justice, and online dispute resolution. The papers are organized in topical sections on knowledge representation, ontologies and XML legislative drafting; knowledge representation, legal ontologies and information retrieval; argumentation and legal reasoning; normative and multi-agent systems; and online dispute resolution.
The use of computing technology for entertainment purposes is not a recent p- nomenon. Video game consoles, home computers and other entertainment media have been used widely for more than three decades, and people of all ages are spe- ing an increasing amount of time and money on these technologies. More recent is the rise of a vibrant research community focusing on gaming and entertainment applications. Driven by the growth and the coming of age of the g- ing industry, and by its increasing recognition in the media and the minds of the broader public, the study of computer games, game development and experiences is attracting the interest of researchers from very diverse fields: social sciences, comp- ing, electrical engineering, design, etc. Research of this kind looks to extend the boundaries of gaming technologies. In a relentless drive for innovation, it looks to create and understand an ever increasing range of experiences, and examine how games can provide value for educational, therapeutic and other 'serious' purposes. These themes were reflected in the call for participation and eventually the papers accepted for presentation. The Fun n' Games conference was the second event of a bi-annual series of c- ferences. The first event of the series was held in Preston in 2006 organized by the University of Central Lancashire. Following the success of this event it was decided to run a follow up.
1.1 Introduction Each year corporations spend millions of dollars training and educating their - ployees. On average, these corporations spend approximately one thousand dollars 1 per employee each year. As businesses struggle to stay on the cutting-edge and to keep their employees educated and up-to-speed with professional trends as well as ever-changing information needs, it is easy to see why corporations are investing more time and money than ever in their efforts to support their employees' prof- sional development. During the Industrial Age, companies strove to control natural resources. The more resources they controlled, the greater their competitive edge in the mark- place. Senge (1993) refers to this kind of organization as resource-based. In the Information Age, companies must create, disseminate, and effectively use kno- edge within their organization in order to maintain their market share. Senge - scribes this kind of organization as knowledge-based. Given that knowledge-based organizations willcontinuetobeadrivingforcebehindtheeconomy, itisimperative that corporations support the knowledge and information needs of their workers.
It is a great pleasure to share with you the Springer CCIS proceedings of the First World Summit on the Knowledge Society - WSKS 2008 that was organized by the Open Research Society, NGO, http://www.open-knowledge-society.org, and hosted by the American College of Greece, http://www.acg.gr, during September 24-27, 2008, in Athens, Greece. The World Summit on the Knowledge Society Series is an international attempt to promote a dialogue on the main aspects of a knowledge society toward a better world for all based on knowledge and learning. The WSKS Series brings together academics, people from industry, policy makers, politicians, government officers and active citizens to look at the impact of infor- tion technology, and the knowledge-based era it is creating, on key facets of today's world: the state, business, society and culture. Six general pillars provide the constitutional elements of the WSKS series: * Social and Humanistic Computing for the Knowledge Society--Emerging Te- nologies and Systems for the Society and Humanity * Knowledge, Learning, Education, Learning Technologies and E-learning for the Knowledge Society * Information Technologies--Knowledge Management Systems--E-business and Enterprise Information Systems for the Knowledge Society * Culture and Cultural Heritage--Technology for Culture Management--Management of Tourism and Entertainment--Tourism Networks in the Knowledge Society * Government and Democracy for the Knowledge Society * Research and Sustainable Development in the Knowledge Society The summit provides a distinct, unique forum for cross-disciplinary fertilization of research, favoring the dissemination of research that is relevant to international re-
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.
TheseriesofworkshopsonMachineLearningforMultimodalInteraction(MLMI) celebratesthisyearits?fthanniversary.Onthisoccasion, anumberofinnovations havebeenintroducedin the reviewingandpublicationprocedures, while keeping the focus onthe samescienti?c topics. For the ?rst time, the reviewing process has been adapted in order to p- parethe proceedings in time for the workshop, held on September 8-10,2008, in Utrecht, The Netherlands. The 47 submissions received by the Program C- mittee were ?rst reviewed by three PC members each, and then advocated by an Area Chair. Overall, 12 oral presentations (ca. 25% of all submissions) and 15 poster presentations were selected. Authors were given one month to revise their papers according to the reviews, and the ?nal versions were brie?y checked by the two Program Co-chairs. Both types of presentation have been give equal space in the present proceedings. The 32 papers gathered in this volume cover a wide range of topics - lated to human-human communication modeling and processing, as well as to human-computer interaction, using several communication modalities. A sign- icant number of papers focus on the analysis of non-verbal communication cues, such as the expression of emotions, laughter, face turning, or gestures, which demonstrates a growing interest for social signal processing. Yet, another large set of papers targets the analysis of communicative content, with a focus on the abstractionofinformationfrommeetingsintheformofsummaries, actionitems, ordialogueacts.OthertopicspresentedatMLMI2008includeaudio-visualscene analysis, speech processing, interactive systems and applica
Since1994, CARDIShasbeentheforemostinternationalconferencededicatedto smart card research and applications. Every two years, the scienti?c community congregates to present new ideas and discuss recent developments with both an academicandindustrialfocus.Followingtheincreasedcapabilitiesofsmartcards anddevices, CARDIS has becomea majoreventfor the discussionofthe various issuesrelatedtotheuseofsmallelectronictokensintheprocessofhuman-machine interactions.Thescopeoftheconferenceincludesnumeroussub?eldssuchasn- working, e?cientimplementations, physicalsecurity, biometrics, andso on. This year's CARDIS was held in London, UK, on September 8-11, 2008. It was organized by the Smart Card Centre, Information Security Group of the Royal Holloway, University of London. Thepresentvolumecontainsthe21papersthatwereselectedfromthe51s- missions to the conference. The 22 members of the program committee worked hard in order to evaluate each submission with at least three reviews and agree on a high quality ?nal program. Additionally, 61 external reviewers helped the committee with their expertise. Two invited talks completed the technical p- gram. The ?rst one, given by Ram Banerjee and Anki Nelaturu, was entitled "Getting Started with Java Card 3.0 Platform." The second one, given by Aline Gouget, was about "Recent Advances in Electronic Cash Design" and was c- pleted by an abstract provided in these proceedings.
This book constitutes the refereed proceedings of the 8th International Conference on Human Choice and Computers (HCC8), IFIP TC9, held in Pretoria, South Africa on September 25-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
The three volume set LNAI 5177, LNAI 5178, and LNAI 5179, constitutes the refereed proceedings of the 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2008, held in Zagreb, Croatia, in September 2008. The 316 revised papers presented were carefully reviewed and selected. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the third volume are intelligent data processing in process systems and plants; neural information processing for data mining; soft computing approach to management engineering; advanced groupware; agent and multi-agent systems: technologies and applications; engineered applications of semantic Web; evolvable hardware and adaptive systems; evolvable hardware applications in the area of electronic circuits design; hyperspectral imagery for remote sensing; immunity-based systems; innovations in intelligent multimedia systems and virtual reality; intelligent environment support for collaborative learning; intelligent systems in medicine and healthcare; knowledge interaction for creative learning; novel foundation and applications of intelligent systems; skill acquisition and ubiquitous human computer interaction; smart sustainability; unsupervised clustering for exploratory data anlysis; and use of AI techniques to build enterprise systems.
The three volume set LNAI 5177, LNAI 5178, and LNAI 5179, constitutes the refereed proceedings of the 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2008, held in Zagreb, Croatia, in September 2008. The 316 revised papers presented were carefully reviewed and selected. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the first volume are artificial neural networks and connectionists systems; fuzzy and neuro-fuzzy systems; evolutionary computation; machine learning and classical AI; agent systems; knowledge based and expert systems; intelligent vision and image processing; knowledge management, ontologies, and data mining; Web intelligence, text and multimedia mining and retrieval; and intelligent robotics and control.
WISE 2008 was held in Auckland, New Zealand, during September 1-3, at The Auckland University ofTechnology City Campus Conference Centre. The aim of this conferencewasto providean internationalforum for researchers, professi- als, and industrial practitioners to share their knowledge in the rapidly growing area of Web technologies, methodologies, and applications. Previous WISE c- ferences wereheld in Hong Kong, China (2000), Kyoto, Japan (2001), Singapore (2002), Rome, Italy (2003), Brisbane, Australia (2004), New York, USA (2005), Wuhan, China (2006) and Nancy, France (2007). The call for papers created considerable interest. Around 110 paper s- missions were received and the international Program Committee selected 31 papers out of the 110 submissions (an acceptance rate of 28. 2%). Of these, 17 papers were chosen for standard presentation and the remaining 14 papers for short presentation. The authors of the accepted papers range across 13 co- tries: Australia, China, Germany, Greece, Italy, Japan, Korea, New Zealand, Poland, Singapore, Spain, Switzerland and the USA. The technical track of the WISE 2008 program o?ered nine paper presentation sessions. The selected - pers covered a wide and important variety of issues in Web information systems engineering such as querying; search; ranking; trust; peer-to-peer networks; - formation ?ltering; information integration; agents and mining. A few selected papers from WISE 2008 will be published in a special issue of the World Wide Web Journal, bySpringer. Inaddition, a $1000prizewasawardedto the authors ofthepaperselectedforthe"YahikoKambayashiBestPaperAward. "Wethank all authors who submitted their papers and the Program Committee members andexternalreviewersfor their excellent work.
The 7th International Conference on Adhoc, Mobile and Wireless Networks (AdHoc-NOW 2008) was held at INRIA Sophia Antipolis - M editerran ee, on the French Riviera, during September 10-12,2008. The six previous conferences intheserieswereheldinMorelia(2007), Ottawa(2006), Cancun(2005), Vanc- ver (2004), Montreal (2003) and Toronto (2002). The purpose of this conference is to provide a forum for researchers from academia/industry and practitioners to meetandexchangeideas regardingrecentdevelopmentsintheareasofad-hoc wireless networks. AdHoc-NOW 2008 received 110 submissions submitted by authors form the following 33 countries: Algeria, Australia, Austria, Belgium, Brazil, Canada, China, the Czech Republic, Denmark, Finland, France, Germany, Greece, India, Iran, Israel, Italy, Japan, Luxembourg, Macedonia, Norway, Pakistan, Poland, Slovakia, South Africa, South Korea, Sri Lanka, Sudan, Switzerland, Taiwan, Tunisia, the UK and the USA. Each paper was assigned to three members of the Technical Program Committee (TPC). Based on the reviews, we decided to accept 39 submissions as regular papers, 24 of them with 25 minutes' oral presentation time, and 15 as poster presentations. All of the accepted papers appear in this volume. We thank the three invited speakers at this conference, Srdjan Krco (Er- sson, Ireland), Xuemin (Sherman) Shen (University of Waterloo, Canada), and Stephan Olariu (Old Dominion University, USA) for accepting our invitation to share their insights on new developments in their research areas."
The International Conference on E-commerce and Web Technologies (EC-Web) is a mature and well-established forum for researchers working in the area of electronic commerce and web technologies. These are the proceedings of the ninth conference in the series, which, like previous EC-Web conferences, was co-located with DEXA, the International Conference on Database and Expert Systems Applications, which, this year, took place in Turin, Italy. One key feature of EC-Web is its two-fold nature: it brings together both papers proposing technological solutions for e-commerce and the World Wide Web, and papers concerning the management of e-commerce, such as web marketing, the impact of e-commerce on business processes and organizations, the analysis of case studies, as well as social aspects of e-commerce (to understand the impact of e-commerce solutions on day-to-day life and the new opportunities that these behaviors open). The technical program included 12 reviewed papers and two invited papers. Each paper was reviewed by five reviewers, in order to select only the best quality papers. The program included five sessions: "Security in E-Commerce" (with two papers), "Social Aspects of E-Commerce" (with two papers), "Business Process and EC Inf- structures" (with three papers), "Recommender Systems and E-Negotiations" (with four papers) and "Web Marketing and User Profiling" (with three papers). We found the program interesting and we hope participants and readers feel the same. Furthermore, we hope the attendees enjoyed the conference and Turin. June 2008 Giuseppe Psaila Roland R. Wagner
This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier ?nancialand data security forum. The ProgramCommittee, led by the PCChair Gene Tsudik, achievedan excellent program balance between research, practice, and panel sessions. This year the program included two new additions, namely, a short-paper track and a poster session, both extremely well received. Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadeloupe, Bermuda, and the Grand Cayman. In 2008 we continued this t- dition and the conference was located in sunny Cozumel, Mexico. The ongoing carnival, sailing, submarine trips, and Mayan ruins were just a few of the - merous exciteme
ED-L2L, Learning to Live in the Knowledge Society, is one of the co-located conferences of the 20th World Computer Congress (WCC2008). The event is organized under the auspices of IFIP (International Federation for Information Processing) and is to be held in Milan from 7th to 10th September 2008. ED-L2L is devoted to themes related to ICT for education in the knowledge society. It provides an international forum for professionals from all continents to discuss research and practice in ICT and education. The event brings together educators, researchers, policy makers, curriculum designers, teacher educators, members of academia, teachers and content producers. ED-L2L is organised by the IFIP Technical Committee 3, Education, with the support of the Institute for Educational Technology, part of the National Research Council of Italy. The Institute is devoted to the study of educational innovation brought about through the use of ICT. Submissions to ED-L2L are published in this conference book. The published papers are devoted to the published conference themes: Developing digital literacy for the knowledge society: information problem solving, creating, capturing and transferring knowledge, commitment to lifelong learning Teaching and learning in the knowledge society, playful and fun learning at home and in the school New models, processes and systems for formal and informal learning environments and organisations Developing a collective intelligence, learning together and sharing knowledge ICT issues in education - ethics, equality, inclusion and parental role Educating ICT professionals for the global knowledge society Managing the transition to the knowledge society |
You may like...
Macroeconomics - South African Edition
Gregory Mankiw, Mark Taylor, …
Hardcover
Studying While Black - Race, Education…
Sharlene Swartz, Alude Mahali, …
Paperback
|